Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-t5tsf Total loading time: 0 Render date: 2024-11-03T02:39:54.120Z Has data issue: false hasContentIssue false

29 - Ethics in Cyberspace: Freedom, Rights, and Cybersecurity

from Part IV - Society

Published online by Cambridge University Press:  18 October 2019

Ali E. Abbas
Affiliation:
University of Southern California
Get access

Summary

The study of cyberethics represents an evolution of computer ethics. When the computer first appeared it was seen as a “revolutionary machine,” because of the scale of its activities and its capability to “solve” certain problems with the help of sophisticated software. Attention was soon focused on the disruptive potential of databases, vexing questions about software ownership, and the “hacker ethic.” Traditional moral concepts and values such as responsibility, privacy, and freedom had to be creatively adapted to this new reality (Johnson & Nissenbaum, 1995).

Type
Chapter
Information
Next-Generation Ethics
Engineering a Better Society
, pp. 444 - 458
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abbate, J. (1999). Inventing the internet. Cambridge, MA: MIT Press.Google Scholar
Andriotis, A. (2017, September 27). Equifax chief quits amid hacking crisis. The Wall Street Journal, A1–2.Google Scholar
Balkin, J. (2005). Digital speech and democratic culture. In Moore, A. (Ed.), Information ethics: Privacy, property, and power (pp. 297354). Seattle, WA: University of Washington Press.Google Scholar
Benner, K. (2016, February 23). Narrow focus may aid FBI in Apple case. The New York Times, B1, B6.Google Scholar
Borgmann, A. (1992). Crossing the postmodern divide. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Bourdieu, P. (1998). Practical reason: On the theory of action. Stanford, CA: Stanford University Press.Google Scholar
Cohen, J. (2016). Between truth and power. In Hildebrandt, M. (Ed.). Information, freedom, and property (pp. 5780) New York, NY: Routledge.Google Scholar
Cohen, J. (2013). What is privacy for? Harvard Law Review, 126, 1904.Google Scholar
Cohn, C. (2015, December 24). The Debate over encryption. The Wall Street Journal, A11.Google Scholar
Comey, J. (2014). Going dark: Are technology, privacy and public safety on a collision course? Retrieved from www.fbi.gov/news/speeches/going-darkGoogle Scholar
Couto, A. (2008). Copyright and freedom of expression: A philosophical map. In Gossieres, A. & Strowel, A. (Eds.), Intellectual property and theories of justice (pp. 3351). New York, NY: MacMillan Palgrave.Google Scholar
De Sola Pool, I. (1984). Technologies of freedom. Cambridge, MA: Harvard University Press.Google Scholar
Himma, K. (2007). Justifying property protection: Why the interests of content creators usually win over everyone else’s. In Rooksby, E. & Weckert, J. (Eds.), Information technology and social justice (pp. 4768). Hershey, PA: Idea Group.Google Scholar
Hughes, J. (1999). Recoding intellectual property and overlooked audience interests. Texas Law Review, 77, 923.Google Scholar
Johnson, D. & Nissenbaum, H. (1995). Introduction, 1–12 computer ethics and social values. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
Koepsell, D. & Inglott, P. (2016). ICT’s architecture of freedom. In Hildebrandt, M. & van den Berg, B. (Eds.), Information, Freedom, and Property: The philosophy of law meets the philosophy of technology (pp. 109132). New York, NY: Routledge.Google Scholar
Lessig, L. (1999). Code and other laws of cyberspace. New York, NY: Basic Books.Google Scholar
Merges, R. (2011). Justifying intellectual property. Cambridge, MA: Harvard University Press.Google Scholar
Mims, C. (2016, February 18). Apple CEO Cook’s risky encryption strategy, The Wall Street Journal, B1.Google Scholar
Mitchell, W. (1995). City of bits: Space, place and infobahn. Cambridge, MA: MIT PressGoogle Scholar
Moor, J. (1985). What is computer ethics? Metaphilosophy, 16(4), 266275.Google Scholar
Reno v. ACLU (1997). 521 U.S. 844.Google Scholar
National Research Council (2000). The digital dilemma: Intellectual property in the information age. Washington, DC: National Research Council.Google Scholar
Nicas, J. & McMillan, R. (2016, February 18). Newer phones aren’t easy to crack. The Wall Street Journal, A6.Google Scholar
O’Brien, D., et al. (2016, September). Privacy and cybersecurity research briefing. Networked policy series, Cambridge, MA: Berkman Klein Center.Google Scholar
Schmidt, E. & Cohen, J. (2013). The new digital age. New York, NY: Knopf.Google Scholar
Sorkin, A. (2016, February 23). When the moral high ground lacks clear boundaries. The New York Times, B1, B6.Google Scholar
Spinello, R. A. (2017). Cyberethics: Morality and law in cyberspace (6th edition). Sudbury, MA: Jones and Bartlett Publishers.Google Scholar
Vallor, S. (2015). Social networking and ethics. Stanford Encyclopedia of Philosophy. Center for the Study of Language and Information.Google Scholar
Wilson, J. (2009). Could there be a right to own intellectual property? Law and Philosophy, 28(4), 393427.Google Scholar
Yahoo v. LICRA 169 F. Supp 2d 1181 (N.D. Cal. 2001).Google Scholar
Zittrain, J. (2003). Internet points of control. Boston College Law Review, 44, 653.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×